Security in Embedded Systems: Design Challenges

This paper describes the current state-of-the-art of side channel attacks (side channel cryptanalysis) on embedded systems. Major countermeasures proposed in the literature are reviewed and the challenges faced by embedded system designers while considering the implementation of such countermeasures are highlighted. The large number of problems to be taken into account and the highly application-dependent character of side channel attacks make it impossible to advise adequate countermeasure as general solutions. The designer must therefore start by defining the adversary the device must resist against and with the resources available for him choose appropriate countermeasures against this adversary. The paper gives an overview of an ongoing research work which aims at finding novel hardware-based techniques to implement countermeasures for timing and power analysis attacks.

[1]  Jean-Jacques Quisquater,et al.  Montgomery Exponentiation with no Final Subtractions: Improved Results , 2000, CHES.

[2]  Erik Tews,et al.  Side Channels in the McEliece PKC , 2008, PQCrypto.

[3]  Falko Strenzke A Timing Attack against the Secret Permutation in the McEliece PKC , 2010, PQCrypto.

[4]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[5]  Paul Dischamp,et al.  Power Analysis, What Is Now Possible , 2000, ASIACRYPT.

[6]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[7]  C. D. Walter,et al.  Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.

[8]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[9]  Abdulhadi Shoufan,et al.  A Timing Attack against Patterson Algorithm in the McEliece PKC , 2009, ICISC.

[10]  Robert H. Deng,et al.  On the equivalence of McEliece's and Niederreiter's public-key cryptosystems , 1994, IEEE Trans. Inf. Theory.

[11]  Marc Joye,et al.  Chinese Remaindering Based Cryptosystems in the Presence of Faults , 1999, Journal of Cryptology.

[12]  Helena Handschuh Cryptanalyse et sécurité des algorithmes a clé secrète , 1999 .

[13]  Miroslaw Kutylowski,et al.  Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense , 2002, ESORICS.

[14]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[15]  Jean-Jacques Quisquater,et al.  A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions. The SEMA and DEMA methods , 2000 .

[16]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.